input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: MLdonkey 2.9.7 - Arbitrary File Disclosure | This is a remote exploit for multiple platform. Description: MLdonkey 2.9.7 - Arbitrary File Disclosure. Author: Michael Peselnik |
Analyze the security implications of: MLdonkey 2.9.7 - Arbitrary File Disclosure | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: DCFM Blog 0.9.4 - SQL Injection | This is a webapps exploit for php platform. Description: DCFM Blog 0.9.4 - SQL Injection. Author: Unohope |
Analyze the security implications of: DCFM Blog 0.9.4 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Oracle 10g - 'CTX_DOC.MARKUP' SQL Injection | This is a local exploit for multiple platform. Description: Oracle 10g - 'CTX_DOC.MARKUP' SQL Injection. Author: sh2kerr |
Analyze the security implications of: Oracle 10g - 'CTX_DOC.MARKUP' SQL Injection | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hikvision Web Server Build 210702 - Command Injection | This is a webapps exploit for hardware platform. Description: Hikvision Web Server Build 210702 - Command Injection. Author: bashis |
Analyze the security implications of: Hikvision Web Server Build 210702 - Command Injection | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Academic Timetable Final Build 7.0a-7.0b - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Academic Timetable Final Build 7.0a-7.0b - 'id' SQL Injection. Author: Ihsan Sencan |
Analyze the security implications of: Academic Timetable Final Build 7.0a-7.0b - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DynoRoot DHCP Client - Command Injection | This is a local exploit for linux platform. Description: DynoRoot DHCP Client - Command Injection. Author: Kevin Kirsche |
Analyze the security implications of: DynoRoot DHCP Client - Command Injection | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: CMS Made Simple < 1.12.1 / < 2.1.3 - Web Server Cache Poisoning | This is a webapps exploit for php platform. Description: CMS Made Simple < 1.12.1 / < 2.1.3 - Web Server Cache Poisoning. Author: Mickaël Walter |
Analyze the security implications of: CMS Made Simple < 1.12.1 / < 2.1.3 - Web Server Cache Poisoning | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DCP-Portal 6.0 - 'login.php?Username' SQL Injection | This is a webapps exploit for php platform. Description: DCP-Portal 6.0 - 'login.php?Username' SQL Injection. Author: HACKERS PAL |
Analyze the security implications of: DCP-Portal 6.0 - 'login.php?Username' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: EgavilanMedia Address Book 1.0 Exploit - SQLi Auth Bypass | This is a webapps exploit for multiple platform. Description: EgavilanMedia Address Book 1.0 Exploit - SQLi Auth Bypass. Author: Mayur Parmar |
Analyze the security implications of: EgavilanMedia Address Book 1.0 Exploit - SQLi Auth Bypass | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: OpenSSH 6.8 < 6.9 - 'PTY' Local Privilege Escalation | This is a local exploit for linux platform. Description: OpenSSH 6.8 < 6.9 - 'PTY' Local Privilege Escalation. Author: Federico Bento |
Analyze the security implications of: OpenSSH 6.8 < 6.9 - 'PTY' Local Privilege Escalation | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mozilla Bonsai 1.3 - Full Path Disclosure | This is a webapps exploit for cgi platform. Description: Mozilla Bonsai 1.3 - Full Path Disclosure. Author: Stan Bubrouski |
Analyze the security implications of: Mozilla Bonsai 1.3 - Full Path Disclosure | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: Cisco ASA 9.2(3) - 'EXTRABACON' Authentication Bypass | This is a remote exploit for hardware platform. Description: Cisco ASA 9.2(3) - 'EXTRABACON' Authentication Bypass. Author: Sean Dillon |
Analyze the security implications of: Cisco ASA 9.2(3) - 'EXTRABACON' Authentication Bypass | This exploit targets hardware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Jax PHP Scripts 1.0/1.34/2.14/3.31 - ips2block Banned IP Disclosure | This is a webapps exploit for php platform. Description: Jax PHP Scripts 1.0/1.34/2.14/3.31 - ips2block Banned IP Disclosure. Author: Lostmon |
Analyze the security implications of: Jax PHP Scripts 1.0/1.34/2.14/3.31 - ips2block Banned IP Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Looking Glass 20040427 - Remote Command Execution | This is a webapps exploit for php platform. Description: Looking Glass 20040427 - Remote Command Execution. Author: rgod |
Analyze the security implications of: Looking Glass 20040427 - Remote Command Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call | This is a dos exploit for linux platform. Description: Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call. Author: sinfony |
Analyze the security implications of: Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Websense Email Security - Denial of Service | This is a dos exploit for hardware platform. Description: Websense Email Security - Denial of Service. Author: Nikolas Sotiriu |
Analyze the security implications of: Websense Email Security - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Adobe Flash - Pointer Crash After Continuing Slow Script | This is a dos exploit for linux platform. Description: Adobe Flash - Pointer Crash After Continuing Slow Script. Author: Google Security Research |
Analyze the security implications of: Adobe Flash - Pointer Crash After Continuing Slow Script | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Gallery Server Pro - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Gallery Server Pro - Arbitrary File Upload. Author: Drew Calcott |
Analyze the security implications of: Gallery Server Pro - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: IBM Informix Web Datablade 4.1x - Page Request SQL Injection | This is a webapps exploit for cgi platform. Description: IBM Informix Web Datablade 4.1x - Page Request SQL Injection. Author: Simon Lodal |
Analyze the security implications of: IBM Informix Web Datablade 4.1x - Page Request SQL Injection | This exploit targets cgi systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets cgi platform |
What is this exploit about: FCrackZip 1.0 - Local Buffer Overflow (PoC) | This is a dos exploit for linux platform. Description: FCrackZip 1.0 - Local Buffer Overflow (PoC). Author: 0x6264 |
Analyze the security implications of: FCrackZip 1.0 - Local Buffer Overflow (PoC) | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: JW Player - 'playerready' Cross-Site Scripting | This is a webapps exploit for php platform. Description: JW Player - 'playerready' Cross-Site Scripting. Author: MustLive |
Analyze the security implications of: JW Player - 'playerready' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: ASP EDGE 1.2b - 'user.asp' SQL Injection | This is a webapps exploit for asp platform. Description: ASP EDGE 1.2b - 'user.asp' SQL Injection. Author: ajann |
Analyze the security implications of: ASP EDGE 1.2b - 'user.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: iScripts AutoHoster - 'tmpid' Local File Inclusion | This is a webapps exploit for php platform. Description: iScripts AutoHoster - 'tmpid' Local File Inclusion. Author: i-Hmx |
Analyze the security implications of: iScripts AutoHoster - 'tmpid' Local File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: UranyumSoft Ýlan Servisi - Database Disclosure | This is a webapps exploit for asp platform. Description: UranyumSoft Ýlan Servisi - Database Disclosure. Author: LionTurk |
Analyze the security implications of: UranyumSoft Ýlan Servisi - Database Disclosure | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Joomla! Component com_simplephotogallery 1.0 - Arbitrary File Upload | This is a webapps exploit for php platform. Description: Joomla! Component com_simplephotogallery 1.0 - Arbitrary File Upload. Author: CrashBandicot |
Analyze the security implications of: Joomla! Component com_simplephotogallery 1.0 - Arbitrary File Upload | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CouchCMS 2.2.1 - Server-Side Request Forgery | This is a webapps exploit for php platform. Description: CouchCMS 2.2.1 - Server-Side Request Forgery. Author: xxcdd |
Analyze the security implications of: CouchCMS 2.2.1 - Server-Side Request Forgery | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: FAQEngine 4.24.00 - Remote File Inclusion | This is a webapps exploit for php platform. Description: FAQEngine 4.24.00 - Remote File Inclusion. Author: kaMtiEz |
Analyze the security implications of: FAQEngine 4.24.00 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Basic PHP Events Lister 2 - Arbitrary Add Admin | This is a webapps exploit for php platform. Description: Basic PHP Events Lister 2 - Arbitrary Add Admin. Author: RENO |
Analyze the security implications of: Basic PHP Events Lister 2 - Arbitrary Add Admin | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'search.jsp?q' Cross-Site Scripting | This is a webapps exploit for jsp platform. Description: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'search.jsp?q' Cross-Site Scripting. Author: Red Hat |
Analyze the security implications of: Apache JackRabbit 1.4/1.5 Content Repository (JCR) - 'search.jsp?q' Cross-Site Scripting | This exploit targets jsp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets jsp platform |
What is this exploit about: Mantis Bug Tracker 0.19 - Remote Server-Side Script Execution | This is a webapps exploit for php platform. Description: Mantis Bug Tracker 0.19 - Remote Server-Side Script Execution. Author: Jose Antonio |
Analyze the security implications of: Mantis Bug Tracker 0.19 - Remote Server-Side Script Execution | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Sophos Products - Multiple Vulnerabilities | This is a remote exploit for multiple platform. Description: Sophos Products - Multiple Vulnerabilities. Author: Tavis Ormandy |
Analyze the security implications of: Sophos Products - Multiple Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: BSD PPP 'pppx.conf' - Local Denial of Service | This is a dos exploit for bsd platform. Description: BSD PPP 'pppx.conf' - Local Denial of Service. Author: sipherr |
Analyze the security implications of: BSD PPP 'pppx.conf' - Local Denial of Service | This exploit targets bsd systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets bsd platform |
What is this exploit about: Melange Chat System 2.0.2 Beta 2 - '/yell' Remote Buffer Overflow | This is a dos exploit for multiple platform. Description: Melange Chat System 2.0.2 Beta 2 - '/yell' Remote Buffer Overflow. Author: DVDMAN |
Analyze the security implications of: Melange Chat System 2.0.2 Beta 2 - '/yell' Remote Buffer Overflow | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.